srtp and h.235.6 secure rtp
SRTP RFCs and h.235 is Not an easy read. Here is my very high level beriefing: AES Encryption (1) AES is the foundation for both srtp and h.235.6 secured rtp…
SRTP RFCs and h.235 is Not an easy read. Here is my very high level beriefing: AES Encryption (1) AES is the foundation for both srtp and h.235.6 secured rtp…
Bro, or sometimes referred to as Bro-IDS is a bit different than Snort and Suricata. In a way Bro is both a signature and anomaly-based IDS. Its analysis engine will…
suricata: on Debian 8 apt-get install suricata ( it is 2.0.7 version) vi /etc/default/suricata ( change RUN=yes, and adjust IFACE to the interface and listen mode to pcap) systemctl start…
DTLS: Basically DTLS is to construct TLS over datagram (UDP, DCCP, etc.) DTLS is similar to TLS intentionally except that DTLS has to solve two problems: packet lost and reordering.…
S/MIME and OpenPGP similarity: both depends on public/private keys to encrypt/authenticate msg ( emails), difference: how to distribute the public keys. S/MIME is similar to TLS, need to depends on…
SRTP sdp msg: v=0 o=jdoe 2890844526 2890842807 IN IP4 10.47.16.5 s=SDP Seminar i=A Seminar on the session description protocol u=http://www.example.com/seminars/sdp.pdf e=j.doe@example.com (Jane Doe) c=IN IP4 161.44.17.12/127 t=2873397496 2873404696 m=video 51372…
How SSH2 works: (1) When a TCP connection is made by a client, the server responds with the protocol versions it supports. If the client can match one of the…
The combination of Diffie-Hellman and the use of ephemeral session keys are what enables “Forward Secrecy”: even if an attacker gains access to the server’s private key they are…
Digital Signature: how it works Digital certificate is one use cases of digital signature. To create the digital signature, the CA generates a message digest from the certificate, encrypts…